IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Natural and Engineering Sciences
  • Volume:3 Issue:2
  • Using Record Level Encryption for Securing Information in Classified Information Systems

Using Record Level Encryption for Securing Information in Classified Information Systems

Authors : Blerim REXHA, Halil SADİKU, Bujar KRASNİQİ
Pages : 207-224
Doi:10.28978/nesciences.424677
View : 22 | Download : 12
Publication Date : 2018-05-17
Article Type : Research Paper
Abstract :Information technology insert ignore into journalissuearticles values(IT); systems have great potential to improve the efficiency and methods of operation in each government organization, providing added convenience and flexibility. Currently, most of government law enforcement agencies have digitized their methods of work by advancing their user services. With this new approach, have come new threats, therefore, it is necessary to develop and implement standard policies to enhance information security and privacy on all classified information systems. In this paper a novel solution is presented for protection of information up to the record level encryption by applying the Advanced Encryption Standard insert ignore into journalissuearticles values(AES); algorithm using derived symmetric master key. The master key is unique per each record and is calculated in the client application. The uniqueness of the derived master key is assured by applying the exclusive or operation of the key of each record and the unique key of the client. Furthermore, this paper includes a critical approach on existing cryptographic methods and proposes additional methods to protect information, such us authentication, access control, and audit.
Keywords : Information security, Privacy, Encryption, Decryption, Access control, Audit

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025